Introduction

What's new in this release?

IP ranges for Browsing protection - You can use the Trusted Hosts table to specify hosts (internal servers) that are considered trusted and safe to visit without consulting Security Cloud (previously known as Real-time Protection Network). The Trusted Hosts table has been added to Browsing Protection policies and table supports both IPv4 and IPv6 IP addresses and ranges.

Application whitelist for F-Secure Network filter - You can use the application whitelist to define commonly used applications as safe. F-Secure Network Filter will not monitor these applications. The whitelist supports full path and SHA-1 hash methods.

Installation steps

Centrally managed

Standalone

1

Download the package

2

Deploy the product

NOTE: If you want to deploy the product with the usage of Offload Scanning Agent (OSA), which is intended to minimize the performance impact to virtualization infrastructure, you will also need to deploy theScanning and Reputation Server (SRS).